Thesis: Outsourcing of Information Technology

Sample Thesis Paper

Once the industrial revolution had passed, firms began to direct their attention towards methods that they could use to expand their competitive advantage in order to increase their markets and in turn their profits. Extensive integration was once considered to be a surefire formula for success became the center of criticism (Halvey & Melby Information technology outsourcing transactions: process, strategies, and contracts 2005).  By the middle of the twentieth century, firms began to realize the significance of economies of scale and the benefit that they could yield. Multiple layer management took on a form more concrete than it had ever been in as organizations began to make plans to begin outsourcing.

Continue reading “Thesis: Outsourcing of Information Technology”

Using Finger to Enumerate nix Systems

The following is an example of how to use the Finger command on remote as well as local *nix systems for enumeration. This is a powerful command that can be used to collect info from a remote system. Boot the system into Linux with the help of the resourceful BackTrack DVD, and Enter “startx” at the provided command prompt. Open the Konsole shell and Enter “man finger” in the shell. Go throught the manual. The spacebar can be used for scrolling through the document. Continue reading “Using Finger to Enumerate nix Systems”

Using Built-in Windows NetBIOS Tools

Before using professionally designed NetBIOS tools, it is wise for security testers to get to know how to use the ones that are built-in as part of the Windows Operating System (OS). Some such tools are the Net view, Nbtstat, and Net use commands. It is better to have a teammate work with you while practising these tools for viewing NetBIOS shares and services. Continue reading “Using Built-in Windows NetBIOS Tools”